Cybersecurity and digital forensics professional
Barcelona L'Hospitalet de Llob, ES, 08908
KPMG España
KPMG en España presta servicios de auditoría, fiscales y de asesoramiento legal, financiero y de negocio.What would make you a great fit?
- Master or university degree in Information Technology or Computer Science with a focus on Cybersecurity and Forensics.
- Experienced (2 years and more) in Cybersecurity and Forensics (digital investigations on computers).
- Willingness to integrate large scale company and international environment.
- Work autonomy, growth mindset, learning agility and team player.
- Business acumen, strong communication skills and ability to present to different levels of stakeholders in a timely manner.
- Fluent Business English.
- Have previous experience working in Microsoft environment, Microsoft Purview and Microsoft Insider Risk Management.
- Have AZ900 and/or SC900 Certifications.
- Have previous experience working with the following solutions: Magnet Forensic Axiom, Exterro Forensic Toolkit (FTK) or OpenText EnCase Forensic.
- Have followed AXIOM AX200 training.
- Are a certified MCFE (Magnet Certified Forensics Examiner) professional.
- Have followed SANS FOR498 and/or FOR500 trainings.
- Are a certified GBFA (GIAC Battlefield Forensics and Acquisition) professional.
- Have previous experience working in international setting.
What will you do?
- Log Analysis: Review system, network, and application logs for unusual activities that could indicate insider threats, such as unauthorized data access, unusual login patterns, or file manipulation.
- Evidence collection: collect digital artifacts, such as emails, chat logs, and file access logs, while following strict evidence-handling procedures to ensure admissibility in potential legal proceedings artifacts.
- Disk and Memory Imaging: Create disk images of suspect systems and memory dumps to preserve the state of a system at a specific time. This preserves evidence and provides a baseline for further analysis.
- Metadata Preservation: Extract metadata from files, emails, and communications to understand how, when, and where data was accessed or modified.
- Behavioral Analysis: Use behavioral analytics tools to identify deviations in user behavior, such as downloading large amounts of sensitive data, accessing restricted areas, or frequently changing device locations.
- User Behavior Analysis: Examine logs and other data to understand the suspect's activity patterns and determine whether actions were intentional or accidental.
- Forensic Tool Utilization: Use specialized tools like Axiom, EnCase, FTK, and other forensic suites to investigate digital evidence, reconstruct actions, and identify patterns that may indicate a risk.
- Stay Updated on Threat Intelligence: Keep up to date with the latest insider threat tactics, techniques, and procedures (TTPs) and adjust detection and prevention strategies accordingly.
- Training and Awareness: Develop and deliver training sessions for employees and managers on recognizing and reporting insider threats, and best practices for data protection.
- Maintain Chain-of-Custody Logs: Ensure all evidence handling follows documented protocols to maintain a clear chain of custody.
- Compliance Checks: Ensure investigations are aligned with regulatory and legal requirements like GDPR, HIPAA, or SOC 2, depending on the organization’s industry.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
1
0
0
Category:
Forensics Jobs
Tags: Analytics Compliance Computer Science EnCase Forensics GDPR GIAC HIPAA Log analysis Risk management SANS SOC SOC 2 Threat intelligence TTPs
Perks/benefits: Career development
Region:
Europe
Country:
Spain
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information System Security Officer jobsInformation Systems Security Officer jobsSenior Cloud Security Engineer jobsInformation Security Manager jobsSenior Network Security Engineer jobsSenior Cybersecurity Engineer jobsInformation Security Specialist jobsSecurity Consultant jobsSecurity Specialist jobsSenior Information Security Analyst jobsSenior Penetration Tester jobsIT Security Engineer jobsSenior Cyber Security Engineer jobsCyber Security Specialist jobsChief Information Security Officer jobsPrincipal Security Engineer jobsIT Security Analyst jobsInformation System Security Officer (ISSO) jobsStaff Security Engineer jobsCloud Security Architect jobsCyber Security Architect jobsSecurity Operations Analyst jobsSystems Administrator jobsThreat Intelligence Analyst jobsSenior Information Security Engineer jobs
GDPR jobsSaaS jobsEncryption jobsForensics jobsTop Secret jobsEDR jobsSDLC jobsMalware jobsRMF jobsSplunk jobsSQL jobsIDS jobsBash jobsIPS jobsIntrusion detection jobsCompTIA jobsDocker jobsDoDD 8570 jobsITIL jobsFinance jobsThreat detection jobsTerraform jobsOWASP jobsCRISC jobsTCP/IP jobs
Active Directory jobsVPN jobsGIAC jobsClearance Required jobsUNIX jobsIT infrastructure jobsBanking jobsAnsible jobsSANS jobsJira jobsJavaScript jobsHIPAA jobsDNS jobsOSCP jobsPolygraph jobsMITRE ATT&CK jobsSOX jobsData Analytics jobsMachine Learning jobsGCIH jobsSOAR jobsSOC 2 jobsCCSP jobsCISO jobsSecurity strategy jobs